by edward | Nov 6, 2023 | Exchange 2016, Exchange 2013, Exchange 2019, NMAP, NMAP Scripting Engine, NSE
Over the past few years, Microsoft Exchange Server has come under heavy attack and with each new Cumulative Update (CU) and Security Update (SU), CVE’s are addressed and closed. The problem comes in when organisations do not patch servers (as mentioned in a few...
by edward | Jul 22, 2023 | Exchange 2016
We all know about the ongoing attacks on Exchange Servers and it is vitally important that you keep up-to-date with patching of your environments, even if it is standalone servers that are just performing management functions. Each Cumulative update (CU) and Security...
by edward | Dec 2, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
If you are new to Exchange, let me bring you up to speed with how attacks have increased since 2020 and Exchange servers that are published to the internet are vulnerable if not locked down. Back in the day, Admins would not patch anything because “it...
by edward | Oct 20, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
The October 2022 security updates for the different Exchange versions are out and it is advisable to update your servers. In my lab, I am running different versions of Exchange servers but I updated my 2019 Exchange servers today. I added a few screenshots to show you...
by edward | Oct 17, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
At the MEC event that recently took place, it was announced that you can now introduce Windows Server 2022 domain controllers if you are using the latest Cumulative Updates for Exchange 2013 and Exchange 2016. Below is a snippet from the supportability matrix on the...
by edward | Jun 7, 2022 | Exchange 2016, Exchange 2013, Exchange 2019
In March 2020 when we had many Exchange servers world wide attacked, the Team at Microsoft put together a nice PowerShell script that provides plenty of output but the most important part is it gives you an overview of CVE vulnerabilities on the Exchange Server. The...